You have been called in to help with an investigation of an alleged network intrusion. After questioning the members of the company IT department, you search through the server log files to find any trace of the intrusion. After that you decide to telnet into one of the company routers to see if there is any evidence to be found. While connected to the router, you see some unusual activity and believe that the attackers are currently connected to that router. You start up an ethereal session to begin capturing traffic on the router that could be used in the investigation. At what layer of the OSI model are you monitoring while watching traffic to and from the router?
A) Network
B) Transport
C) Data Link
D) Session
Correct Answer:
Verified
Q17: What is one method of bypassing a
Q18: Where does Encase search to recover NTFS
Q19: If you are concerned about a high
Q20: Harold is a web designer who has
Q21: When searching through file headers for picture
Q22: To check for POP3 traffic using Ethereal,
Q23: Where are files temporarily written in Unix
Q24: Julie is a college student majoring in
Q25: Sniffers that place NICs in promiscuous mode
Q26: Jack Smith is a forensics investigator who
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents